Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Explainers via Perturbation., , , , and . CoRR, (2019)A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels., and . ACM Trans. Internet Techn., 21 (2): 39:1-39:22 (2021)A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels., and . CoRR, (2020)OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding., , , and . ICDCS, page 525-535. IEEE, (2019)Novel store-carry-forward scheme for message dissemination in vehicular ad-hoc networks., , and . ICT Express, 3 (4): 193-198 (2017)c-Eval: A Unified Metric to Evaluate Feature-based Explanations via Perturbation., , , , and . IEEE BigData, page 927-937. IEEE, (2021)Analysis of Privacy Leakage in Federated Large Language Models., , , and . AISTATS, volume 238 of Proceedings of Machine Learning Research, page 1423-1431. PMLR, (2024)Denial-of-Service Vulnerability of Hash-based Transaction Sharding: Attacks and Countermeasures., and . CoRR, (2020)XRand: Differentially Private Defense against Explanation-Guided Attacks., , , and . AAAI, page 11873-11881. AAAI Press, (2023)Active Membership Inference Attack under Local Differential Privacy in Federated Learning., , , , and . AISTATS, volume 206 of Proceedings of Machine Learning Research, page 5714-5730. PMLR, (2023)